Hi,

Thanks for letting me know.

Best,
Mahir

On Sun, Feb 14, 2021, 9:08 AM Mike Drob <md...@mdrob.com> wrote:

> Future vulnerability reports should be sent to secur...@apache.org so
> that they can be resolved privately.
>
> Thank you
>
> On Fri, Feb 12, 2021 at 10:17 AM Ishan Chattopadhyaya <
> ichattopadhy...@gmail.com> wrote:
>
>> Recent versions of Solr use 2048.
>>
>> https://github.com/apache/lucene-solr/blob/branch_8_6/solr/core/src/java/org/apache/solr/util/CryptoKeys.java#L332
>>
>> Thanks for your report.
>>
>> On Fri, Feb 12, 2021 at 3:44 PM Mahir Kabir <mdmahiras...@vt.edu> wrote:
>>
>> > Hello,
>> >
>> > I am a Ph.D. student at Virginia Tech, USA. While working on a security
>> > project-related work, we came across the following vulnerability in the
>> > source code -
>> >
>> > In file
>> >
>> >
>> https://github.com/apache/lucene-solr/blob/branch_6_6/solr/core/src/java/org/apache/solr/util/CryptoKeys.java
>> > <
>> >
>> https://github.com/apache/ranger/blob/71e1dd40366c8eb8e9c498b0b5158d85d603af02/kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java
>> > >
>> > (at
>> > Line 300) Key Size was set as 1024.
>> >
>> > *Security Impact*:
>> >
>> > < 2048 key size for RSA algorithm makes the system vulnerable to
>> > brute-force attack
>> >
>> > *Useful resource*:
>> > https://rules.sonarsource.com/java/type/Vulnerability/RSPEC-4426
>> > https://rules.sonarsource.com/java/type/Vulnerability/RSPEC-4426
>> >
>> > *Solution we suggest*:
>> >
>> > For RSA algorithm, the key size should be >= 2048
>> >
>> > *Please share with us your opinions/comments if there is any*:
>> >
>> > Is the bug report helpful?
>> >
>> > Please let us know what you think about the issue. Any feedback will be
>> > appreciated.
>> >
>> > Thank you,
>> > Md Mahir Asef Kabir
>> > Ph.D. Student
>> > Department of CS
>> > Virginia Tech
>> >
>>
>

Reply via email to